Beckhoff Embedded PC Images and TwinCAT Components Vulnerabilities
Beckhoff Embedded PC Images (manufactured before October 22, 2014) and TwinCAT Components featuring Automation Device Specification (ADS) communication lack authentication and encryption mechanisms. The ADS protocol transmits automation commands in plaintext without authentication, allowing an attacker with network access to intercept, read, and modify control messages. This affects all versions of TwinCAT using ADS protocol. An attacker could alter process variables, modify PLC logic, disable safety interlocks, or cause operational anomalies. No vendor fix is available; systems remain vulnerable with current versions.
- Network access to port 48898 (default ADS port) or other ADS communication channels
- Ability to perform man-in-the-middle (MitM) attack or network sniffing
- No authentication or encryption on ADS protocol
- TwinCAT components or Beckhoff Embedded PC running vulnerable firmware
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6032671d-6c59-47b6-8002-c1604c525ee1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.